HackDig : Dig high-quality web security articles for hackers

Link Arms Against the Attackers: Observations from the 2016 Cisco ASR

Remember 2007, when the underground economy began to flourish, using simple protocols and static subnet ranges to control their infrastructure? That was the same year Cisco published the first Annual Security Report (ASR). Nine years later, the drumbeat of cyberthreats grow louder, but the actors and threats are familiar, just as John reminded us when this y
Publish At:2016-01-27 03:30 | Read:4177 | Comments:0 | Tags:Security 2016 ASR Active Threat Analytics cisco-ata incident

A Sheep in Wolf’s Clothing

Those of us who work in security operations are well accustomed to blind spots. Depending on the size of the network, our security technologies can trigger thousands of security alerts daily. We know from experience that the vast majority of these alerts are false-positives – innocuous activity that behaves a bit funny. But we also know that real threats are
Publish At:2015-10-28 19:30 | Read:3255 | Comments:0 | Tags:Security Active Threat Analytics ATA full packet capture pca

Active Threat Analytics: Easing the Burden of Threat Management

In Greek mythology, Sisyphus was a trickster king cursed with the eternal torment of fruitless labor. As punishment for his hubris and wile, Zeus condemned this hapless figure to the unending task of pushing a boulder up a mountain. Once he reached the top, the boulder would fall back down. And he would begin again. And again. Every day. Forever.I suspect th
Publish At:2015-10-26 13:30 | Read:6737 | Comments:0 | Tags:Security Active Threat Analytics ATA Big Data full packet ca


Share high-quality web security related articles with you:)